A protocol for provably secure authentication of a tiny entity to a high performance computing one
From MaRDI portal
Publication:1793779
DOI10.1155/2016/9289050zbMath1400.94187OpenAlexW2398597476WikidataQ59141052 ScholiaQ59141052MaRDI QIDQ1793779
Miodrag J. Mihaljević, Aleksandar Perović, Siniša Tomović, Zoran Ognjanović
Publication date: 12 October 2018
Published in: Mathematical Problems in Engineering (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1155/2016/9289050
Uses Software
Cites Work
- Unnamed Item
- HB-MP: a further step in the HB-family of lightweight authentication protocols
- Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs
- The Cryptographic Power of Random Selection
- Efficient Authentication from Hard Learning Problems
- Parallel and Concurrent Security of the HB and HB + Protocols
- On the Security of HB# against a Man-in-the-Middle Attack
- Trusted-HB: A Low-Cost Version of HB$^+$ Secure Against Man-in-the-Middle Attacks
- On the inherent intractability of certain coding problems (Corresp.)
- On the Security Proof of an Authentication Protocol from Eurocrypt 2011
- Authenticating Pervasive Devices with Human Protocols
- : Increasing the Security and Efficiency of
- Parallel and concurrent security of the HB and \(HB^{+}\) protocols